AvalZ / modsecurity-cli
A CLI wrapper for libmodsecurity (v3.0.10)
☆12Updated last year
Alternatives and similar repositories for modsecurity-cli:
Users that are interested in modsecurity-cli are comparing it to the libraries listed below
- A web security research tool for DOM testing☆19Updated this week
- ☆36Updated 2 months ago
- An Adaptive Misuse Detection System☆36Updated 3 months ago
- using ML models for red teaming☆42Updated last year
- ☆32Updated last year
- Code for shelLM tool☆51Updated 3 weeks ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 4 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 5 months ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆20Updated 2 months ago
- ☆18Updated last year
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- ☆15Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last week
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated last week
- Modular web-application honeypot platform built using go and gin☆55Updated 9 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated 2 weeks ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- Signature based honeypot detector tool written in Golang☆89Updated 2 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆49Updated 3 months ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆15Updated 9 months ago
- Repository of tools and resources for analyzing Docker containers☆62Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- ☆22Updated 4 years ago
- ☆36Updated 3 weeks ago